Handbook of Biometric Anti-Spoofing

@inproceedings{Marcel2014HandbookOB,
  title={Handbook of Biometric Anti-Spoofing},
  author={Sbastien Marcel and Mark S. Nixon and S. Li},
  booktitle={Advances in Computer Vision and Pattern Recognition},
  year={2014}
}
Presenting the first definitive study of the subject, this Handbook of Biometric Anti-Spoofing reviews the state of the art in covert attacks against biometric systems and in deriving countermeasures to these attacks. Topics and features: provides a detailed introduction to the field of biometric anti-spoofing and a thorough review of the associated literature; examines spoofing attacks against five biometric modalities, namely, fingerprints, face, iris, speaker and gait; discusses anti… 

A review of iris anti-spoofing

The goal of this paper is to provide a comprehensive and structured overview on the work that has been carried out over the last decade in the field of iris anti-spoofing to provide biometric researchers an overall picture of the current panorama following a systematic approach.

Biometrics Systems Under Spoofing Attack: An evaluation methodology and lessons learned

This tutorial article presents an introduction to spoofing and antispoofing research, describes the vulnerabilities, presents an evaluation methodology for the assessment of spoofs and countermeasures, and outlines research priorities for the future.

Biometric Antispoofing Methods: A Survey in Face Recognition

The goal of this paper is to provide a comprehensive overview on the work that has been carried out over the last decade in the emerging field of antispoofing, with special attention to the mature and largely deployed face modality.

Provoking security: Spoofing attacks against crypto-biometric systems

This paper presents crypto-biometric techniques, analyzing comparatively the different categories according to the main goal of the design and the methodology used in, and suggests a novel bimodal system, able to reject such kind of attacks.

A Survey on Antispoofing Schemes for Fingerprint Recognition Systems

The literature is reviewed and the state of the art in fingerprint antispoofing is presented, which includes several countermeasures that discriminate between live fingerprints and spoof artifacts.

50 years of biometric research: Accomplishments, challenges, and opportunities

A Survey on Anti-Spoofing Methods for Facial Recognition with RGB Cameras of Generic Consumer Devices

This survey thoroughly investigates the face Presentation Attack Detection methods, that only require RGB cameras of generic consumer devices, over the past two decades and presents an attack scenario-oriented typology of the existing face PAD methods.

years of biometric research : Accomplishments , challenges , and opportunities ✩

The significant progress that has been achieved in the field of biometric recognition in the past 50 years since Mitchell Trauring’s landmark paper is document to unlock the full potential of biometrics through inter-disciplinary research.
...

References

SHOWING 1-10 OF 101 REFERENCES

On the effectiveness of local binary patterns in face anti-spoofing

This paper inspects the potential of texture features based on Local Binary Patterns (LBP) and their variations on three types of attacks: printed photographs, and photos and videos displayed on electronic screens of different sizes and concludes that LBP show moderate discriminability when confronted with a wide set of attack types.

Anti-spoofing in Action: Joint Operation with a Verification System

Techniques for decision- level and score-level fusion to integrate a recognition and anti-spoofing systems are studied, using an open-source framework that handles the ternary classification problem (clients, impostors and attacks) transparently.

Face spoofing detection through partial least squares and low-level descriptors

This paper describes an anti-spoofing solution based on a set of low-level feature descriptors capable of distinguishing between ‘live’ and ‘spoof’ images and videos, and explores both spatial and temporal information to learn distinctive characteristics between the two classes.

Robustness of multimodal biometric fusion methods against spoof attacks

Motion-based counter-measures to photo attacks in face recognition

A publicly available PHOTO-ATTACK database is introduced, and a new technique of counter-measure solely based on foreground/background motion correlation using Optical Flow that outperforms all other algorithms achieving nearly perfect scoring with an equal-error rate of 1.52% is proposed.

Verifying liveness by multiple experts in face biometrics

A holistic liveness detection paradigm that collaborates with standard techniques in 2D face biometrics is suggested that shows that many attacks are avertible via a combination of anti-spoofing measures.

Video-Based Face Spoofing Detection through Visual Rhythm Analysis

This work presents a solution to video-based face spoofing to biometric systems based in the analysis of global information that is invariant to video content and takes advantage of noise signatures generated by the recaptured video to distinguish between fake and valid access.

An Analysis of Minutiae Matching Strength

The potential security holes in a biometrics-based authentication scheme are outlined, the numerical strength of one method of fingerprint matching is quantified, then how to combat some of the remaining weaknesses are discussed.

Computationally Efficient Face Spoofing Detection with Motion Magnification

A new approach for spoofing detection in face videos using motion magnification using Eulerian motion magnification approach, which improves the state-of-art performance, especially HOOF descriptor yielding a near perfect half total error rate.

On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals

A new approach based on artificial, tone-like signals which provoke higher ASV scores than genuine client tests is introduced, demonstrating the importance of efforts to develop dedicated countermeasures to protect ASV systems from spoofing.
...